-
221
The power of personas: Exploring an innovative model for understanding stakeholder perspectives in an oncology learning health network
Published 2025-01-01“…Abstract Introduction Learning health networks (LHNs) improve clinical outcomes by applying core tenets of continuous quality improvements (QI) to reach community‐defined outcomes, data‐sharing, and empowered interdisciplinary teams including patients and caregivers. …”
Get full text
Article -
222
Application of artificial intelligence in the health management of chronic disease: bibliometric analysis
Published 2025-01-01“…These include improving research quality, fostering greater international and inter-institutional collaboration, standardizing data-sharing practices, and addressing ethical and legal concerns. …”
Get full text
Article -
223
Using Laboratory Test Results for Surveillance During a New Outbreak of Acute Hepatitis in 3-Week- to 5-Year-Old Children in the United Kingdom, the Netherlands, Ireland, and Curaç...
Published 2024-12-01“…Federated analytics using nondisclosive, summary-level laboratory data sharing was successful, safe, and efficient. The approach holds potential as a tool for pandemic surveillance in future outbreaks. …”
Get full text
Article -
224
Development and application of intelligent auxiliary diagnosis system in the Traditional Chinese Medicine nursing clinic (智能辅诊系统在中医护理门诊中的开发与应用)...
Published 2021-01-01“…In order to further simplify the treatment process, solve existing problems, increase data sharing, and promote the communication and cooperation between medical staff and patients, our hospital has developed an intelligent auxiliary diagnosis system through the integration of "Internet + technology" and TCM nursing. …”
Get full text
Article -
225
Advances and Prospects in Smart Border Studies Based on a Bibliometric Analysis
Published 2025-01-01“…A smart border management model with Chinese characteristics should be constructed, emphasizing data sharing, technological interoperability, and coordination and cooperation among all parties. …”
Get full text
Article -
226
The Use of Social Network in Daily Pediatric Practice and Education: Turkish Pediatric Atelier
Published 2020-01-01“…Registry name, registration number, web link to study on registry, and data sharing statement.…”
Get full text
Article -
227
Harnessing Big Heterogeneous Data to Evaluate the Potential Impact of HIV Responses Among Key Populations in Sub-Saharan Africa: Protocol for the Boloka Data Repository Initiative
Published 2025-01-01“…A list of current and potential data partners has been compiled (January 2023 to date). Data sharing or user agreements have been signed with several data partners (August 2023 to date). …”
Get full text
Article -
228
The Complete Inpatient Record Using Comprehensive Electronic Data (CIRCE) project: A team‐based approach to clinically validated, research‐ready electronic health record data
Published 2025-01-01“…Conclusions The CIRCE Project represents a novel cooperative research model to capture clinically validated EHR data from a large diverse academic health system in the greater Philadelphia region and is designed to facilitate collaboration and data sharing to support learning health system activities. …”
Get full text
Article -
229
L’involution géographique : des données géosociales aux algorithmes
Published 2016-12-01“…Geolocated data shared on the social web arouse geographers’ interest. …”
Get full text
Article -
230
Open Source Data and Strategic Project for Resilient City
Published 2019-06-01“…In the research field, an experimental analysis is carried out within the Genoese neighborhood of Molassana by comparing and processing, in a single system, the traditional cartography provided by the online portals of the public administration and the data shared by users on social networks and open source platforms. …”
Get full text
Article -
231
Improve the robustness of algorithm under adversarial environment by moving target defense
Published 2020-08-01“…Traditional machine learning models works in peace environment,assuming that training data and test data share the same distribution.However,the hypothesis does not hold in areas like malicious document detection.The enemy attacks the classification algorithm by modifying the test samples so that the well-constructed malicious samples can escape the detection by machine learning models.To improve the security of machine learning algorithms,moving target defense (MTD) based method was proposed to enhance the robustness.Experimental results show that the proposed method could effectively resist the evasion attack to detection algorithm by dynamic transformation in the stages of algorithm model,feature selection and result output.…”
Get full text
Article -
232
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Published 2021-10-01“…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
Get full text
Article -
233
Design of federated routing mechanism in cross-domain scenario
Published 2020-10-01“…With the development of multi-network integration,how to ensure efficient interconnections among multiple independent network domains is becoming a key problem.Traditional interdomain routing protocol fails due to the limitation of domain information privacy,where each autonomous domain doesn’t share any specific intra-domain information.A machine learning-based federated routing mechanism was proposed to overcome the existing shortcomings.Each autonomous domain shares intra-domain information implicitly via neural network models and parameters.It not only breaks data islands problems but also greatly reduces the amount of transmitted data shared between domains,then decreases convergence delay of entire network information.Based on the federated routing mechanism,border routers can formulate global optimal routing strategies according to the status of entire network.…”
Get full text
Article -
234
Interpretative phenomenological analysis of guidance advocates’ online counseling experiences
Published 2025-01-01“…Among these variables are: (i) discourse that mirrors the exchanges between a counselor and a client; (ii) framework, which includes OC dynamics and changing communication requirements; and (iii) learner autonomy, which stands for the involvement of clients in online learning.DiscussionA community-based framework for developing students is formed by these variables. The data shared by participants reveal complex issues as they struggle with the limitations and realities of applying standards in multimodal counseling sessions. …”
Get full text
Article -
235
Assessment of relationships between epigenetic age acceleration and multiple sclerosis: a bidirectional mendelian randomization study
Published 2025-01-01“…Methods This analysis employed statistics approaches from genome-wide association studies related to various epigenetic clocks (GrimAge, HannumAge, PhenoAge, and HorvathAge) and multiple sclerosis, utilizing robust instrumental variables from the Edinburgh DataShare (n = 34,710) and the International Multiple Sclerosis Genetics Consortium (including 24,091 controls and 14,498 cases). …”
Get full text
Article -
236
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01“…Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the scope of quantum computation it can perform are usually somewhat limited, which significantly reduces the flexibility of the scheme in quantum network environments. …”
Get full text
Article -
237
Natural Language Processing and Social Determinants of Health in Mental Health Research: AI-Assisted Scoping Review
Published 2025-01-01“…This review can be a starting point for researchers looking for an overview of mental health projects using text data. Shared datasets could be used to place more emphasis on SDOH in future studies.…”
Get full text
Article